Performance Evaluation of Scheduling Mechanisms for Broadband Networks
|
|
- Victor Dawson
- 6 years ago
- Views:
Transcription
1 Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas Committee: Dr. David W. Petr (Chair) Dr. Joseph B. Evans Dr. David L. Andrews Information & Telecommunications Technology Center (ITTC), EECS, University of Kansas
2 Abbreviations HF 2 Q - Hybrid FIFO Fair Queuing WFQ - Weighted Fair Queuing FIFO - First In First Out GPS - Generalized Processor Sharing BWA - Broadband Wireless Access DOCSIS - Data Over Cable Service Interface Specification MAC - Medium Access Control QoS - Quality of Service 2
3 Presentation Outline Introduction & Motivation Scheduling Mechanisms & Fair queuing Description of HF 2 Q Performance Characterization of HF 2 Q DOCSIS 1.1 Operation Performance Evaluation of DOCSIS 1.1 Summary of Results Contributions & Future Work 3
4 Introduction & Motivation Future broadband networks will support multiple types of traffic over single physical infrastructure Issue of scheduling mechanisms and bandwidth allocation play a critical role Packet Fair Queuing algorithms have received a lot of attention Hybrid FIFO Fair Queuing (HF 2 Q) a new queuing discipline Has very interesting properties and hence a performance characterization would prove worthwhile 4
5 Introduction & Motivation (cont.) DOCSIS de facto standard for delivering broadband services over HFC networks, defines MAC scheduling mechanisms for BWA, developed by CableLabs The IEEE protocol was developed for Broadband Wireless Access (BWA) systems to provide Internet access and multimedia services to end users. Consolidation of two proposals, one of which was based on DOCSIS 1.1 DOCSIS 1.1 built on top of DOCSIS 1.0, specifies QoS components in terms of MAC scheduling based on underlying traffic requirements Standardized in 2001 a performance evaluation is significant in terms of understanding the operation of the protocol as such and its new QoS features 5
6 Scheduling Mechanisms and Fair Queuing Queuing algorithms determine the way packets from different sources interact Controls order in which packets are sent In the classic FIFO the order of arrival completely determines bandwidth allocation Fair in the sense that all packets get equal mean waiting times Protection against ill-behaved sources is required and hence the requirement of an algorithm that provides fair bandwidth allocation A class of fair queuing algorithms have been proposed since then 6
7 Background on FQ policies FQ algorithms maintain separate queues for packets from individual sources Queues are serviced in a round robin manner Provide fair treatment for supported flows by splitting bandwidth based on pre-defined weights Fairness Criterion : For any two backlogged flows, each flow s service (normalized to its weight) should be nearly the same 7
8 Weighted Fair Queuing WFQ is a packet scheduling technique allowing guaranteed bandwidth services WFQ is a GPS approximation for packet networks GPS is an idealized fluid model that cannot be implemented practically The time at which a packet would complete service in GPS is computed and the packet is assigned a timestamp Timestamps are virtual finish times Packets are served in increasing order of their timestamps 8
9 WFQ : Virtual time WFQ operation linked to the GPS system using virtual time defines the order in which packets are served Virtual time v(t) is a piecewise linear increasing function of time v(t) x x x x x Has a rate of increase inversely proportional to the sum of the service rates of the backlogged flows C v( t2) v( t1) =.( t2 t1) r t k B( t 1, t k ) 2 9
10 WFQ : Virtual Start and Finish Times i th packet of flow k is denoted by p ki, its arrival time by a ki and its length by L k i v(a ki ) is the value of v(t) at the time of packet arrival Virtual finish times are assigned as shown Virtual start time denoted by S i k varies depending on whether a new arrival is to an empty flow or backlogged flow WFQ serves packets in increasing order of finish times 10
11 HF 2 Q description A new and an interesting queuing algorithm discovered while developing the WFQ simulation model A small change in the WFQ operation leads to HF 2 Q Named Hybrid FIFO Fair Queuing since it exhibits desirable properties of both FIFO and WFQ Exhibits FIFO behavior when the total system load is less than unity Behaves as WFQ when the system is overloaded 11
12 HF 2 Q implementation v(t) represented by roundnumber ( currenttime lastrupdatetime) roundnumbe r = roundnumber +. capacity weightsum Instants when the roundnumber (v(t)) is updated is kept track of using a variable lastrupdatetime The lastrupdatetime is not updated when a new packet arrives after an idle period in HF 2 Q Scheduling order thus changes 12
13 HF 2 Q vs. WFQ Virtual Time τ e - end of a server busy period, τ s - instant when the first packet arrives after an idle period from flow a 1, τ 2 - the instant of arrival of second packet Offset between v(t) and v (t) v (t) The new arrival at τ 2 gets assigned v (t) in HF 2 Q rather than v(t) in WFQ Virtual time v(t) Slope C r a1 τ e τ s τ 2 t 13
14 Performance Characterization Delay and throughput characteristics were studied and comparisons where made with WFQ Simulations were performed using Extend, using discrete event simulation techniques Link speed of 1Mbps, mean packet lengths of 8000 bits (uniformly distributed service times) Poisson arrivals with exponential inter-arrival times were used All experiments were performed with three flows, with flow 1 always being the tagged flow (i.e. the flow whose load is varied) 14
15 Delay Results :HF 2 Q: Load < 1 The three flows had reservations of 0.2, 0.7 & 0.1 Mbps respectively The tagged flow load was varied and the incoming loads of flows 2 & 3 were 0.09 Mbps The tagged flow exceeds its reservation after a load of 0.2 Mbps Mean Delay (s) It is seen that HF Q behaves as 0.01 FIFO offering equal mean 0 waiting times for all flows Mean Delay for various incoming loads of tagged flow Flow 1 Flow 2 Flow 3 Incoming load for tagged flow (Mb/s) 15
16 Delay Results :WFQ: Load < 1 Same reservations and incoming loads were maintained for all flows It is observed that WFQ offers protection to the well-behaved flows (2 & 3) The delay of the tagged flow increases after it exceeds its reservation Flow 2 gets a lower delay compared to flow 3 since its reservation is higher Mean Delay (s) Flow 1 Flow 2 Flow 3 Mean Delay for various incoming loads of tagged flow Incoming load for tagged flow (Mb/s) 16
17 Delay Results :HF 2 Q: Load > 1 The tagged flow was increased so that the system load reaches 116% The delay of the tagged flow is not shown since it increases infinitely As is seen, the delay of the other two flows is low and bounded after a small transitional period As will be shown, HF 2 Q exhibits WFQ behavior after the transitional period Mean Delay (s) Mean Delay for various incoming loads of tagged flow Incoming load for tagged flow (Mb/s) Flow 2 Flow 3 17
18 Delay Results (Load > 1 cont.) Result for HF 2 Q (after the transitional region) Result for WFQ (after the transitional region) 0.03 Mean Delay for various incoming loads of tagged flow Mean Delay for various incoming loads of tagged flow Flow 2 Flow Mean Delay (s) Mean Delay (s) Flow 2 Flow Incoming load for tagged flow (Mb/s) Incoming load for tagged flow (Mb/s) 18
19 Throughput Experiment Throughput - fraction of link capacity used to carry packets Three flows with reservations of 0.5, 0.3 & 0.2 Mbps Flows 2 & 3 had incoming loads of 0.4 & 0.5 Mpbs respectively Flows 2 & 3 heavily exceed their reservation The system is overloaded after the incoming load of the tagged flow exceeds 0.1 Mbps The throughput behavior of FIFO, HF 2 Q and WFQ were studied 19
20 Throughput Results - FIFO All work conserving algorithms provide throughput equal to the incoming load when the total system load is less than unity When the system is overloaded FIFO offers throughput proportional to offered load WFQ and HF 2 Q on the other hand protects the wellbehaving 0.1 flows Normalized throughput Throughput vs Incoming load of tagged flow Incoming load of tagged flow (Mb/s) Flow 1 Flow 2 Flow 3 20
21 Throughput Results HF 2 Q & WFQ HF 2 Q WFQ Flow 1 Flow 2 Flow 3 Throughput vs Incoming load of tagged flow Throughput vs Incoming load of tagged flow Flow 1 Flow 2 Flow 3 Normalized throughput Normalized throughput Incoming load of tagged flow (Mb/s) Incoming load of tagged flow (Mb/s) 21
22 Conclusions Drawn HF 2 Q services packets in FIFO order when the total system load is less than one Indicated by equal mean waiting times Verified via simulations with packet sequence numbers Initial start-up period when ordering is not FIFO HF 2 Q services packets as WFQ does when heavily overloaded Transitional period when the load is barely over unity 22
23 DOCSIS Introduction In DOCSIS a Cable Modem Termination System (CMTS) controls the operations of many terminating Cable Modems (CMs). Upstream and downstream channels are separated using FDD. Each upstream channel is further divided into a stream of fixed-size time minislots (TDMA). DOCSIS MAC utilizes a request/grant mechanism to coordinate transmission between multiple CMs. 23
24 DOCSIS Operation 24
25 Request Mechanisms Contention - the CM may transmit a request in the contention period Piggybacking - is a request for additional bandwidth sent in a data transmission Unsolicited grants fixed size grants offered in a periodic basis Unicast request polls - unicast request opportunities are sent as a means of real-time polls regardless of network congestion 25
26 DOCSIS 1.1 QoS Classes Unsolicited Grant Service (UGS) Offers fixed unsolicited size grants on periodic basis Designed for fixed size data packet flows on fixed intervals Real Time Polling Service (rtps) Designed to support real-time flows that generate variable size packets on a periodic basis Offers periodic unicast polls that allow CM to specify the size of the desired grant 26
27 DOCSIS 1.1 QoS Classes (cont.) Non Real Time Polling Service (nrtps) Designed to support non-real time flows that require variable size grants on a regular basis Offers unicast polls on a regular basis and CMs are allowed to use contention opportunities and piggybacking Best Effort (BE) Service Provides efficient service to Best Effort Traffic Uses contention and piggybacking for requests Limited QoS Support 27
28 Performance Evaluation of DOCSIS 1.1 QoS Key performance attribute studied - Mean Access Delay Simulations were done in OPNET Comparison of BE and UGS performance Effect of DOCSIS 1.1 QoS features on performance Fragmentation - sending a portion of packet frame during a reserved slot time Concatenation - sending more than a frame during a transmission opportunity Piggybacking - a request carried in the next outgoing data frame Traffic Priority - CMTS uses Traffic Priority attribute for determining precedence in grant generation 28
29 Experiment 1: Comparison of Best Effort & UGS Delays UGS UGS flows are allowed to reserve certain portion of the bandwidth No transmission requests are needed; hence low, constant access delay BE request grant,request grant pattern Has to contend for sending requests May result in collision and thus increased delay due to retransmissions Piggybacking: requests are piggybacked to outgoing data and thus delay is reduced 29
30 Experiment 1: Comparison of Best Effort & UGS Delays (cont.) Load increased by adding BE stations Fragmentation & Concatenation were disabled Exponential packet lengths & inter-arrival times Backoff start = 7 30
31 Experiment 2: Effect of Fragmentation & Concatenation Load was increased by adding BE stations Exponential Packet Lengths and Exponential Inter-Arrival Times Fragmentation & Concatenation improve performance considerably Piggybacking was enabled;backoff start =7 31
32 Contention Resolution Algorithm (CRA) Overview CRA triggered by request collision Supported CRA: Truncated Binary Exponential Back-off Specified by an initial backoff window (Back-off start) and a maximum back-off (Back-off End) CM randomly selects a value within its back-off window - [0,2 Backoff ] Random number indicates the number of contention opportunities the CM must defer before transmitting requests On collision, increases the back-off window by a factor of 2 (less than back-off end) and repeats deferring process 32
33 Experiment 3: Effect of Backoff Start on Collision (piggybacking disabled) Packet lengths and interarrival times were made constant Since Piggybacking is disabled, collision probability increases with load As backoff start value increases, collision probability decreases 33
34 Experiment 3: Effect of Backoff Start on Collision (piggybacking enabled) Less Collision probability compared to the piggybacking disabled case since frequent contention is not necessary As load increases, collision probability decreases since contention load decreases 34
35 Experiment 3: Effect of Backoff Start on Delay Backoff 0 suffers maximum delay Backoff 4 produces a marked improvement in performance Backoff 7: reduced collision is offset by longer backoff delay 35
36 Experiment 4: Effect of Traffic Priorities on Delay CMTS uses Traffic Priority attribute for determining precedence in grant generation Priorities do not affect contention Traffic Priorities range from 0-7 applicable to BE, rtps & nrtps, 0 being the highest Hence high priority stations have lower access delays 36
37 Summary of Results Performance Evaluation of HF 2 Q HF 2 Q behaves as FIFO when the total system load is less than 1 Behaves as WFQ when the system is heavily overloaded Throughput behavior of HF 2 Q confirms these properties DOCSIS 1.1 UGS always receives bounded delay characteristics Fragmentation and Concatenation improve performance when system is overloaded Piggybacking improves delay characteristics CRA plays an important role in BE performance Traffic priority has significant effect on BE performance 37
38 Contributions & Future Work Performance characterization of a new queuing discipline -HF 2 Q was done Performance evaluation of DOCSIS QoS Scope for future work with regard to HF 2 Q Analytic explanation as to why HF 2 Q behaves as FIFO in an underloaded case Finding a closed form expression for the mean waiting time for WFQ Performance evaluation studies of two other traffic classes that DOCSIS 1.1 mentions namely rtps and nrtps yet to be done 38
39 Discussion Thank you! 39
Preliminary Performance Evaluation of QoS in DOCSIS 1.1
The University of Kansas Technical Report Preliminary Performance Evaluation of QoS in DOCSIS 1.1 Gayathri Chandrasekaran, Mohammed Hawa and David W. Petr ITTC-FY2003-TR-22736-01 January 2003 Sponsor:
More informationPerformance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop
Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Mihir Thaker Masters Thesis Presentation Department of Electrical Engineering and Computer
More informationACLASS of users that has drawn much attention over the
296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,
More informationModeling a MAC Scheduler: Experiences with a DOCSIS Cable
Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656
More informationCover Page. Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message
Cover Page 1. Title of Paper Performance Evaluation of the DOCSIS 1.1 MAC Protocol According to the Structure of a MAP Message 2. Name of the authors, Sung-Han Park, and Jae-Hyun Kim 3. About authors Affiliation
More informationDOWNSTREAM RESOURCE ALLOCATION IN DOCSIS 3.0 CHANNEL BONDED NETWORKS
Clemson University TigerPrints All Dissertations Dissertations 8-2011 DOWNSTREAM RESOURCE ALLOCATION IN DOCSIS 3.0 CHANNEL BONDED NETWORKS Scott Moser Clemson University, smoser@clemson.edu Follow this
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationFairness in the IEEE network. Shun Y. Cheung
Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing
More informationRouter Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13
Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Department of Electrical Engineering and Computer Sciences University of California Berkeley Review: Switch Architectures Input Queued
More informationIEEE Broadband Wireless Access Working Group < Evaluation Procedure for MAC Protocols
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Evaluation Procedure for 802.16 MAC Protocols 2000-04-25 Source Hoon Choi Natl. Inst. of Standards
More informationThe Interaction Between the DOCSIS 1.1/2.0 MAC Protocol and TCP Application Performance
The Interaction Between the DOCSIS /20 MAC Protocol and TCP Application Performance Jim Martin jimmartin@csclemsonedu Department of Computer Science Clemson University Abstract- The deployment of data-over-cable
More informationUpstream Scheduler Mode Configuration for the Cisco ubr CMTS
Upstream Scheduler Mode Configuration for the Cisco ubr CMTS Document ID: 69704 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Upstream Scheduling in
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationA Heuristic Strategy for IEEE WiMAX scheduler for Quality of Service
A Heuristic Strategy for IEEE 802.16 WiMAX scheduler for Quality of Service G.S. Paschos, I. Papapanagiotou, C.G. Argyropoulos and S.A. Kotsopoulos Wireless Telecommunication Laboratory Electrical and
More informationNetwork Model for Delay-Sensitive Traffic
Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.
More informationScheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router
Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all
More informationPacket Scheduling and QoS
Packet Scheduling and QoS EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Thursday Oct 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Packet
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationWireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)
Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling
More informationCongestion Control and Resource Allocation
Congestion Control and Resource Allocation Lecture material taken from Computer Networks A Systems Approach, Third Edition,Peterson and Davie, Morgan Kaufmann, 2007. Advanced Computer Networks Congestion
More informationKommunikationssysteme [KS]
Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationA QoS aware Packet Scheduling Scheme for WiMAX
A QoS aware Packet Scheduling Scheme for WiMAX Mahasweta Sarkar and Harpreet Sachdeva ABSTRACT WiMAX is one of the most promising broadband wireless technologies today. The WiMAX standard-802.16-is designed
More informationPARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS
THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:
More informationDimensioning the Contention Channel of DOCSIS Cable Modem Networks
Dimensioning the Contention Channel of DOCSIS Cable Modem Networks J. Lambert, B. Van Houdt, and C. Blondia University of Antwerp, Department of Mathematics and Computer Science, Performance Analysis of
More informationValidating an ns Simulation Model of the DOCSIS Protocol
Validating an ns Simulation Model of the DOCSIS Protocol Jim Martin, Mike Westall Department of Computer Science Clemson University {jim.martin,westall}@cs.clemson.edu Keywords: Simulation, broadband access,
More informationModeling The DOCSIS 1.1/2.0 MAC Protocol
Modeling The DOCSIS 11/20 MAC Protocol Jim Martin Department of Computer Science Clemson University Clemson, SC jimmartin@csclemsonedu Abstract We have developed a model of the Data over Cable (DOCSIS)
More informationPriority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies
CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation
More informationValidating an ns Simulation Model of the DOCSIS Protocol
Validating an ns Simulation Model of the DOCSIS Protocol Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-974 jimmartin@csclemsonedu Abstract-- The number of households and
More informationChapter 6 Queuing Disciplines. Networking CS 3470, Section 1
Chapter 6 Queuing Disciplines Networking CS 3470, Section 1 Flow control vs Congestion control Flow control involves preventing senders from overrunning the capacity of the receivers Congestion control
More informationDelay Analysis of IEEE Wireless Metropolitan Area Network
Delay Analysis of IEEE 802.16 Wireless Metropolitan Area Network Zsolt Saffer Technical University of Budapest 1521 Budapest Hungary safferzs@hit.bme.hu Sergey Andreev State University of Aerospace Instrumentation
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationLecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.
Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/
More informationCONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL
CONTENTION RESOLUTION ALGORITHMS FOR CATV NETWORKS BASED ON THE DVB/DAVIC PROTOCOL V. Rangel 1, R. Edwards 1, and K. Schunke 2 1 C4MCR, University of Sheffield, UK and 2 ICT, Braunschweig Technical University,
More informationThe Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP
The Impact of the DOCSIS 11/20 MAC Protocol on TCP Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-0974 jimmartin@csclemsonedu Abstract-- The number of broadband cable access
More informationClass-based Packet Scheduling Policies for Bluetooth
Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,
More informationValidating an ns Simulation Model of the DOCSIS Protocol
Validating an ns Simulation Model of the DOCSIS Protocol Jim Martin, Mike Westall Department of Computer Science Clemson University Clemson, SC 29634-974 jim.martin,westall@cs.clemson.edu Abstract-- The
More informationEfficient Uplink Scheduler Architecture of Subscriber Station in IEEE System
Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer
More informationTELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)
TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationHow DOCSIS Protocol Solves Asymmetric Bandwidth Issue in Cable Network
Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 55 62 (2006) 55 How DOCSIS Protocol Solves Asymmetric Bandwidth Issue in Cable Network Wei-Tsong Lee 1, Kuo-Chih Chu 2 *, Chin-Ping Tan 3 and
More informationNew Contention Resolution Schemes for WiMAX
New Contention Resolution Schemes for WiMAX Jesús Delicado,QiangNi, Francisco M. Delicado and Luis Orozco Barbosa Instituto de Investigación en Informática de Albacete (I 3 A) Universidad de Castilla La
More informationMesh Networks
Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE
More informationEP2210 Scheduling. Lecture material:
EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom
More informationCongestion Control 3/16/09
Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if
More informationEVALUATION OF EDCF MECHANISM FOR QoS IN IEEE WIRELESS NETWORKS
MERL A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com EVALUATION OF EDCF MECHANISM FOR QoS IN IEEE802.11 WIRELESS NETWORKS Daqing Gu and Jinyun Zhang TR-2003-51 May 2003 Abstract In this paper,
More informationMAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS. Re: Medium Access Control Task Group Call for Contributions Session #4
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group MAC Protocol Proposal for Fixed BWA Networks Based on DOCSIS 1999-10-29 Source Phil Guillemette SpaceBridge Networks Corporation
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More informationNetwork Support for Multimedia
Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationNetwork Layer Enhancements
Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationLecture 24: Scheduling and QoS
Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated
More informationInternet Services & Protocols. Quality of Service Architecture
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:
More informationUpstream Channel Bonding
The (USCB) feature helps cable operators offer higher upstream (US) bandwidth per cable modem (CM) user by combining multiple radio frequency (RF) channels to form a larger bonding group at the MAC layer.
More informationUpstream Channel Bonding
The (USCB) feature helps cable operators offer higher upstream (US) bandwidth per cable modem (CM) user by combining multiple radio frequency (RF) channels to form a larger bonding group at the MAC layer.
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationICE 1332/0715 Mobile Computing (Summer, 2008)
ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationOverview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services
Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling
More informationQueuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines
Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid
More informationExperimental Evaluation of DOCSIS 1.1 Upstream Performance. Chaitanya K. Godsay
Experimental Evaluation of DOCSIS. Upstream Performance BY Chaitanya K. Godsay B.E., University of Pune, India (999) THESIS Submitted to the University of New Hampshire in partial fulfillment of the requirements
More informationBandwidth Allocation for Quality of Service Provision in IEEE Systems
Bandwidth Allocation for Quality of Service Provision in IEEE 802.16 Systems Tze Wei Tang Thesis submitted for the degree of Doctor of Philosophy in Electrical and Electronic Engineering at The University
More informationResource allocation in networks. Resource Allocation in Networks. Resource allocation
Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationGUARANTEED END-TO-END LATENCY THROUGH ETHERNET
GUARANTEED END-TO-END LATENCY THROUGH ETHERNET Øyvind Holmeide, OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com Markus Schmitz, OnTime Networks LLC, Texas, USA markus@ontimenet.com Abstract: Latency
More informationCN R G. Empirical Evaluation of Upstream Throughput in a DOCSIS Access Network. Swapnil Bhatia (with Radim Bartoš and Chaitanya Godsay)
Empirical Evaluation of Upstream Throughput in a DOCSIS Access Network Swapnil Bhatia (with Radim Bartoš and Chaitanya Godsay) Computer Networks Research Group Department of Computer Science and CN R G
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationLatency in DOCSIS Networks
Latency in DOCSIS Networks Greg White Sept. 26, 2013 The various DOCSIS versions From a latency perspective DOCSIS 1.0 ca. 1996, deployments ~1998 Fundamental request-grant upstream MAC layer definition
More informationResearch Article Performance Optimization for Delay-Tolerant and Contention-Based Application in IEEE Networks
Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2008, Article ID 573785, 14 pages doi:10.1155/2008/573785 Research Article Performance Optimization for Delay-Tolerant
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master
More informationDesign and analysis of MAC protocols for wireless networks
Graduate Theses and Dissertations Graduate College 2009 Design and analysis of MAC protocols for wireless networks Haithem Al-mefleh Iowa State University Follow this and additional works at: http://lib.dr.iastate.edu/etd
More informationof-service Support on the Internet
Quality-of of-service Support on the Internet Dept. of Computer Science, University of Rochester 2008-11-24 CSC 257/457 - Fall 2008 1 Quality of Service Support Some Internet applications (i.e. multimedia)
More informationFlexible Resource Allocation in IEEE Wireless Metropolitan Area Networks
Flexible Resource Allocation in IEEE 802.16 Wireless Metropolitan Area Networks Spyros A. Xergias, Nikos Passas and Lazaros Merakos Communication Networks Laboratory Department of Informatics & Telecommunications
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationP D1.1 RPR OPNET Model User Guide
P802.17 D1.1 RPR OPNET Model User Guide Revision Nov7 Yan F. Robichaud Mark Joseph Francisco Changcheng Huang Optical Networks Laboratory Carleton University 7 November 2002 Table Of Contents 0 Overview...1
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationA QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX
A QoS Oriented Analysis of ertps and UGS flows in voice application over WIMAX Abdalla A\ Alrahman Mohamed Abdalla 1, Dr. Amin Babiker A\ Nabi 2, Dr. Ashraf A. Osman 3 1,2,3 Department of communication,
More informationNovel MIME Type and Extension Based Packet Classification Algorithm in WiMAX
Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX Siddu P. Algur Departmentof Computer Science Rani Chennamma University Belgaum, India Niharika Kumar Department of Information
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationMedia Access Control Protocol Based on DOCSIS 1.1
Document Number: IEEE 802.16mp-99/16 Title: Media Access Control Protocol Based on DOCSIS 1.1 Date Submitted: 1999-11-08 Source: Karl Stambaugh Voice: 480-441-7842 Motorola Inc. Fax: 480-675-2116 8220
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationUpstream Channel Bonding
First Published: November 16, 2009 Last Updated: June 16, 2014 The (USCB) feature helps cable operators offer higher upstream (US) bandwidth per cable modem (CM) user by combining multiple radio frequency
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationPerformance anomaly of b
Laboratoire LSR Logiciels Systèmes Réseaux Software, Systems, Networks Performance anomaly of 802.11b Andrzej Duda LSR-IMAG Andrzej.Duda@imag.fr Joint work with Martin Heusse, Franck Rousseau, Gilles Berger-Sabbatel
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationLecture Outline. Bag of Tricks
Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information
More informationVoIP over wireless networks: a packet scheduling approach to provide QoS using Linux
VoIP over 82.11 wireless networks: a packet scheduling approach to provide QoS using Linux Terrence van Valkenhoef and Mishar Mahboob December 13, 25 Abstract In this work, we propose a layer three scheduler
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationH3C S9500 QoS Technology White Paper
H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and
More information